Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
General
-
Target
6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe
-
Size
1.1MB
-
MD5
e3f8a7c796b3a85cf91c58be37966ef4
-
SHA1
a8616424d6436976bed32c5a00421b4d7dbce0f5
-
SHA256
6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2
-
SHA512
f849416b83e6f8d571355b08dddfd11abcef983367bafd92abd147c93696b1eb8b868e97f168b7ef075b34152cb1ed9c22ef0f9cd194a7b7b09fd0ff3d4ebdcc
-
SSDEEP
24576:iNrNYoYB0gYjgKPK3VwV5k7j5awX300zQUGtZc:S+7Kd8KK3VwXgj5aEkHUGtZc
Malware Config
Extracted
vipkeylogger
https://api.telegram.org/bot7808466522:AAFleMCkdYBjkW3SQRMH5osM11THNEIFjRA/sendMessage?chat_id=7161037710
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 5104 powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 688 6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
Blocklisted process makes network request 11 IoCs
flow pid Process 24 3764 msiexec.exe 26 3764 msiexec.exe 28 3764 msiexec.exe 30 3764 msiexec.exe 32 3764 msiexec.exe 37 3764 msiexec.exe 39 3764 msiexec.exe 41 3764 msiexec.exe 52 3764 msiexec.exe 68 3764 msiexec.exe 69 3764 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 drive.google.com 24 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 checkip.dyndns.org -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\stilhederne\tamtammens.ini 6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 3764 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5104 powershell.exe 3764 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\inddatafunktionens.Tra 6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 3764 msiexec.exe 3764 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5104 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 5104 powershell.exe Token: SeIncreaseQuotaPrivilege 5104 powershell.exe Token: SeSecurityPrivilege 5104 powershell.exe Token: SeTakeOwnershipPrivilege 5104 powershell.exe Token: SeLoadDriverPrivilege 5104 powershell.exe Token: SeSystemProfilePrivilege 5104 powershell.exe Token: SeSystemtimePrivilege 5104 powershell.exe Token: SeProfSingleProcessPrivilege 5104 powershell.exe Token: SeIncBasePriorityPrivilege 5104 powershell.exe Token: SeCreatePagefilePrivilege 5104 powershell.exe Token: SeBackupPrivilege 5104 powershell.exe Token: SeRestorePrivilege 5104 powershell.exe Token: SeShutdownPrivilege 5104 powershell.exe Token: SeDebugPrivilege 5104 powershell.exe Token: SeSystemEnvironmentPrivilege 5104 powershell.exe Token: SeRemoteShutdownPrivilege 5104 powershell.exe Token: SeUndockPrivilege 5104 powershell.exe Token: SeManageVolumePrivilege 5104 powershell.exe Token: 33 5104 powershell.exe Token: 34 5104 powershell.exe Token: 35 5104 powershell.exe Token: 36 5104 powershell.exe Token: SeDebugPrivilege 3764 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 688 wrote to memory of 5104 688 6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe 82 PID 688 wrote to memory of 5104 688 6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe 82 PID 688 wrote to memory of 5104 688 6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe 82 PID 5104 wrote to memory of 3764 5104 powershell.exe 91 PID 5104 wrote to memory of 3764 5104 powershell.exe 91 PID 5104 wrote to memory of 3764 5104 powershell.exe 91 PID 5104 wrote to memory of 3764 5104 powershell.exe 91 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe"C:\Users\Admin\AppData\Local\Temp\6acb2bcd36980972b24bf0530a4e18ce9ddf91c2e794287ba826353177f038e2.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Imiteret=gc -raw 'C:\Users\Admin\AppData\Local\Temp\globosely\baadehavn\stnner\Unimbosomed\Bumpenes.Dep';$chaffseed=$Imiteret.SubString(4998,3);.$chaffseed($Imiteret) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Accesses Microsoft Outlook profiles
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
333KB
MD5bc4fc12ec00a0f87953621ce84c1fa87
SHA17dbf8eca4034ceda343cef51f3b77eb20abd80e6
SHA256b49bc65b763bab0b03e66ca20030f4a64ccfa0d7eebabdcdd5bfcf311a62dcc3
SHA512ad0d494caee5b33d4f43cc9c23a258a1c830073ff16e7c9d4cf1a0a353cb9066068716fba244003eeb2587941fe947bb56494187a2c33e35f095e6b036195812
-
Filesize
69KB
MD5b10ff0ccf79bb61d61cd633e5ede053b
SHA17ed3bf6dff9eef31af0ce686de2eb065f236b903
SHA256e7325519e43155f0a712f457473d79856bc88d63218136d2b960ed5807cb4b0e
SHA512ad8d1f56ca7fdb3f6b65897a125cce6e6c49508c75f64bc945109d22cd9b88912a23068b69ad94c4c2bcea50ebf6d8ffac40c28c89b13f641c55bfdccc8b1404
-
Filesize
7KB
MD5675c4948e1efc929edcabfe67148eddd
SHA1f5bdd2c4329ed2732ecfe3423c3cc482606eb28e
SHA2561076ca39c449ed1a968021b76ef31f22a5692dfafeea29460e8d970a63c59906
SHA51261737021f86f54279d0a4e35db0d0808e9a55d89784a31d597f2e4b65b7bbeec99aa6c79d65258259130eeda2e5b2820f4f1247777a3010f2dc53e30c612a683